MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c280803318fcc959993a058b17616e02a2101b910287033a8f26559c94277f69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: c280803318fcc959993a058b17616e02a2101b910287033a8f26559c94277f69
SHA3-384 hash: eab28e960b36740f581a889029bbc7083343b83476057261c30f292f407925d5ec36d006f915b86b82f69b79955f8b7f
SHA1 hash: d31eb541b16118f592ee10d3893244078f7c007a
MD5 hash: 438c9f30e6a3562de8f9a7d680d6846e
humanhash: maryland-earth-mars-sierra
File name:44508.5578762731.dat.dll
Download: download sample
Signature Quakbot
File size:282'624 bytes
First seen:2021-11-12 15:48:06 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash b6a19f1001dd6b1b07bd285855d8f1af (2 x Quakbot)
ssdeep 6144:049vqTPawAYktAs6hreUG77RABKCEa7exK/p/:049vqTMfARhg5ABKZNxK/l
Threatray 366 similar samples on MalwareBazaar
TLSH T11A546BD1E908A786F5DA4C7E0639E57115E34D389AA480DB77FB3E0330B39E21536E0A
File icon (PE):PE icon
dhash icon e486aaca8accf470 (2 x Quakbot)
Reporter James_inthe_box
Tags:dll Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Execute DLL with spoofed extension
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2021-11-12 15:47:44 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama127 campaign:1636711808 banker evasion stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Loads dropped DLL
Qakbot/Qbot
Windows security bypass
Malware Config
C2 Extraction:
136.232.34.70:443
181.118.183.31:443
72.252.147.208:465
94.200.181.154:443
71.13.93.154:2083
96.21.251.127:2222
182.176.180.73:443
88.234.20.155:995
41.228.22.180:443
89.137.52.44:443
102.65.38.57:443
94.196.209.83:995
207.246.112.221:995
207.246.112.221:443
39.49.116.108:995
190.73.3.148:2222
63.143.92.99:995
216.238.71.31:443
216.238.71.31:995
216.238.72.121:443
216.238.72.121:995
2.222.167.138:443
87.109.236.83:995
105.198.236.99:995
89.101.97.139:443
140.82.49.12:443
96.246.158.154:995
71.13.93.154:6881
103.142.10.177:443
123.252.190.14:443
136.143.11.232:443
117.248.109.38:21
93.48.80.198:995
76.25.142.196:443
187.121.88.3:995
45.9.20.200:2211
201.172.31.95:80
120.150.218.241:995
27.223.92.142:995
75.188.35.168:443
45.46.53.140:2222
75.169.58.229:32100
73.151.236.31:443
103.143.8.71:995
173.21.10.71:2222
189.135.98.193:443
71.74.12.34:443
115.186.190.72:995
50.194.160.233:443
41.37.243.129:443
189.223.33.109:443
73.140.38.124:443
65.100.174.110:8443
189.147.225.12:443
100.1.119.41:443
79.160.207.214:443
72.252.147.208:995
50.194.160.233:32100
50.194.160.233:465
109.12.111.14:443
181.4.49.208:465
108.4.67.252:443
83.223.164.163:443
24.55.112.61:443
24.139.72.117:443
77.57.204.78:443
24.229.150.54:995
78.153.126.175:443
71.13.93.154:2222
115.96.64.9:995
117.198.155.237:443
94.60.254.81:443
109.177.77.68:995
86.97.8.204:443
86.98.1.197:443
93.147.212.206:443
86.8.177.143:443
68.204.7.158:443
81.250.153.227:2222
197.87.182.15:443
91.178.126.51:995
146.66.139.84:443
103.116.178.85:993
67.165.206.193:993
75.66.88.33:443
94.110.12.148:995
111.250.56.31:443
189.146.127.83:443
93.48.58.123:2222
96.37.113.36:993
68.186.192.69:443
92.59.35.196:2222
86.173.96.126:443
109.133.93.127:995
80.6.192.58:443
109.228.255.59:443
176.35.109.202:2222
72.27.126.188:995
103.150.40.76:995
103.143.8.71:443
185.53.147.51:443
162.244.227.34:443
216.201.162.158:443
39.52.224.170:995
188.27.119.243:443
73.25.109.183:2222
47.72.219.120:995
196.207.140.50:995
115.96.188.188:995
Unpacked files
SH256 hash:
26c4aebb7663fea17dfa1bc1dad5eed4dc0f7feee0714f437ca774d07e390ae6
MD5 hash:
51f64a7f4cfe64198d00e507456c8eab
SHA1 hash:
f8a93c318cb4c9413e20dd1a6b85aad7cd01975d
SH256 hash:
c280803318fcc959993a058b17616e02a2101b910287033a8f26559c94277f69
MD5 hash:
438c9f30e6a3562de8f9a7d680d6846e
SHA1 hash:
d31eb541b16118f592ee10d3893244078f7c007a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments